☆432Feb 2, 2022Updated 4 years ago
Alternatives and similar repositories for External-Pentest-Checklist
Users that are interested in External-Pentest-Checklist are comparing it to the libraries listed below
Sorting:
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆189Apr 26, 2020Updated 5 years ago
- ☆81May 4, 2020Updated 5 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆279Aug 12, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- MayorSec DNS Enumeration Tool☆90Nov 30, 2024Updated last year
- Kali Linux Fixes for Newly Imported VM's☆2,396Jun 30, 2025Updated 8 months ago
- Python3 o365 User Enumeration Tool☆567Jan 28, 2026Updated last month
- Google Dork File Finder☆197Jan 6, 2025Updated last year
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆798Oct 23, 2020Updated 5 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆6,022Feb 12, 2023Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,925Jan 28, 2026Updated last month
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆708Sep 4, 2024Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆261Jul 2, 2025Updated 8 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,642Jul 27, 2025Updated 7 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- ☆15Apr 13, 2021Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆218Dec 28, 2022Updated 3 years ago
- It is a compilation of some resources for preparing for OSCP.☆204May 1, 2022Updated 3 years ago
- ☆848Jan 12, 2026Updated last month
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Short checklists for penetration testing methodology☆201Sep 5, 2023Updated 2 years ago
- Notes for Beginner Network Pentesting Course☆6,215Sep 21, 2022Updated 3 years ago
- ☆755Aug 26, 2022Updated 3 years ago
- Multi-threaded Python Port Scanner with Nmap Integration☆388Sep 4, 2022Updated 3 years ago
- OSWE, OSEP, OSED, OSEE☆3,770Jan 2, 2026Updated 2 months ago
- ☆1,073May 18, 2024Updated last year